Setting Up Your Security Policy
In this chapter, we’re going to learn about building security policies. These rules will ensure that users and remote networks are able to reach the resources they need but are prevented from accessing restricted resources. We’ll learn how we can leverage user ID, HIP profiles, and tags to dynamically adjust access based on the user’s access level and the device the user is connecting from. We’ll also learn how to set up clientless VPN access to internal resources.
In this chapter, we’re going to cover the following main topics:
- Why do we need security rules?
- Building security policies in Strata Cloud Manager
- Building security policies in Panorama
- Clientless VPN